Intro to IT Fundamentals FC0-U61

¡Supera tus tareas y exámenes ahora con Quizwiz!

The combination of Linux-based files that gets released as a product is called what?

A Linux-based OS is called a distribution, which is a combination of the kernel, shell, and utilities needed for a fully functional OS.

Which of the following statements most accurately describes what a primary key refers to?

A field in a table. A primary key is one or more fields whose data is used to identify a record uniquely. They are required, and there can be only one primary key per table.

Flowcharts depict which one of the following? A. Programs B. Objects C. Functions D. Identifiers

A flowchart is a visual depiction of a program. It includes the logic components, inputs, and all other properties of the program.

You want to understand the sequence of a program, from start to finish. Which of the following is the best to use for this purpose? Pseudocode Function Flowchart Object

A flowchart is designed to depict visually the sequence of events and logic within a program.

You have created a relational database. Which of the following elements uniquely identifies a record in the database?

A primary key is one or more fields whose data is used to uniquely identify a record.

Which of the following consists of columns and rows of numerical or text data?

A relational database has structured data, which is predictable and organized, with tables containing columns and rows of text or numerical data.

A programmer is writing a program that needs to accept an input of someone's name. What type of variable should the programmer create?

A string is a group of characters—technically, zero or more characters, but not having a fixed length.

Which of the following is not a feature of a file system?

Access control is managed by the operating system, not the file system. Permissions, encryption and journaling are features of a file system.

Fred, a co-worker, heard about new software called Oreo. To which operating system is he referring?

Android versions are currently named after different types of sweets. iOS versions don't have nicknames. macOS was named after big cats and is now named after California locations.

Which of the following statements is true regarding arrays and vectors?

Arrays contain one data type and are fixed in length. Vectors can have multiple data types and are dynamic in length. Arrays and vectors are containers for data. Vectors are more flexible, containing multiple data types and being dynamic in length.

A programmer wants to write code that directly accesses the computer's hardware. Which is the best type of language for the programmer to use?

Assembly is the lowest-level programming language, and it is used when developers want to access computer hardware directly.

Which of the following programming language types is the lowest-level language?

Assembly is the lowest-level programming language. Interpreted and compiled are high-level languages, and query languages are used to get data from a database.

Which of the following would not be considered metadata for a spreadsheet file?

Calculations inside the file is not metadata. Metadata includes Read-only attributes, Name of the file, and file size. Any data or information inside a file is part of the file itself, not the metadata for the file. Metadata is information about the file, such as its name, size, creator, and security.

Your friend Michael just purchased a Chromebook and wants to know where his files are stored. What do you tell him?

Chromebooks often have very small hard drives, and they are not used for file storage. By default, all files are stored on Google's cloud.

Which of the following application delivery methods requires Internet access?

Cloud hosted apps require Internet access.

What type of high-level programming language is translated into machine code once and then executed many times?

Compiled language programs are compiled once and then executed as many times as needed. Scripted, scripting, and markup languages are interpreted languages, which are not compiled with a compiler.

Which of the following is not an example of productivity software?

Conferencing software is collaboration software. Word processing software, Visual diagramming software, Web browser are productivity software.

Mary, an administrator, creates a field and designates it to hold integer data. Joe, a user, tries to enter his name into the field, but it doesn't let him save the data. What is this an example of?

Constraints can be placed on fields such that they will accept only certain types of data. For example, if a field is set to accept only integers, users will not be allowed to enter in text data.

Which of the following is not a function of an operating system

Coordinate software applications. An operating system provides an environment for the software to function, but it does not coordinate between software applications.

You need to prepare a new replacement hard drive for storage. What is the first step needed to get it ready?

Create a partition. Before the hard drive can be used for file storage, it needs at least one partition. Once it's partitioned, you can format the drive, which will install a file system.

You have created an array that can hold 15 items, all of the integer data type. You want to add a 16th integer. Which of the following is the best approach to doing this?

Create a vector and replace the array with it. Arrays are of a fixed length, so you can't just add another variable if it's at its maximum length. Vectors can have their length dynamically adjusted and might work better in this situation.

A database developer is working on generating queries. If the developer needs to ensure that the output of the query has data persistence, to where should the data be written?

Data persistence means that the data is permanently available. Hard drives store data in a persistent way, so the answer is SSD.

What software is designed to let the OS talk to hardware?

Drivers are designed to let the OS talk to hardware. Each piece of hardware must have a driver to work with the operating system.

Which of the following is an example of a markup language?

Extensible Markup Language (XML) is an example of a markup language. The other primary markup language is Hypertext Markup Language (HTML).

Which of the following file systems does not have built-in security?

File Allocation Table (FAT) does not have built-in security. HFS, ext3, ext4 do have built in security.

Which of the following is an example of an embedded OS?

Firmware is an example of an embedded OS. They are small and require very few resources to run.

A developer needs to use a code designation for non-English letters. Which notational system does the developer need to use?

For non-English, use the superset of ASCII called Unicode. ASCII and Unicode are used for numerical representations of letters and symbols. ASCII covers English letters and some symbols.

You just installed an antivirus program on your laptop computer. Given a scenario in which you want to maintain proper levels of security, how often should you update the software?

For security software, such as antivirus protection, you should update the definition file at least once per week. Better yet, set the software to update automatically.

Which of the following terms describe concepts related to breaking code into smaller, repeatable sections? Each correct answer represents a complete solution. Choose two. A. Functions B. Variables C. Containers D. Methods E. Objects

Functions and methods are used to break code into small, reusable segments.

Which of the following numbers is written in hexadecimal format? A. 100101.11 B. 100101 C. 3268 D. 18AF

Hexadecimal is also known as base 16. It uses the numbers 1 to 9 and letters A to F.

Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given this scenario, what is her best course of action to use it more than 16 additional times?

If a software product is giving you a limited number of uses, you must activate that software with the manufacturer. This typically requires you to have a software license and a product key.

You have just plugged in a new HP printer to your Mac. You can't find a printer driver. What should you do given the circumstances?

If you're ever missing a driver, go to the manufacturer's website to download it and then install it.

Joe creates a database. What does he need to do next to make it usable?

Import data. After a database is created, data needs to be imported or inputted.

You need to update a Windows driver for a sound card. Which utility should you use?

In Windows, drivers can be upgraded and managed from Device Manager.

Which of the following descriptions best describes the type of structure that stores values as blobs?

In a key/value database, data is represented as a collection of key/value pairs. Keys are an arbitrary string of characters, such as filename or a URL, and must be unique. Values are stored as blobs, meaning that they don't conform to a schema. Relational, non-relational, and document databases do not work this way.

Which of the following is not generally included in a two-tier architecture model?

In a two-tier model, the business logic layer is usually omitted. The application layer is the client-side software.

You visit a website that is supposed to be secure. Your web browser shows the web address in a red font, and you do not see a lock icon. What is the most likely cause of this?

Invalid certificate. If a website's security certificate is invalid, the web browser will warn you.

How many subdirectories are you allowed to create within a single directory in an OS?

It depends on the OS. The subdirectories depend upon the OS that is allowed to create within a single directory in an OS. For example, ext3 allows for 32,000 subdirectories, and ext4 allows for 64,000 subdirectories.

A program shows the number 11010.11. Which data type is this?

It's a float data type, which is a number with a decimal place. It could be binary, but binary is a notational system, not a data type.

Which of the following are examples of object-oriented programming languages? Each correct answer represents a complete solution. Choose two. A. Java B. XML C. Python D. C E. SQL

Java and Python are considered object-oriented languages, as are C++, C#, PHP, Perl, and Ruby.

John purchases a single-use software license for an application and installs it on his desktop. Then he installs it on his laptop computer. In this scenario, which of the following statements is true?

John can use the application on both computers, but only one at a time. Single-use software licenses typically state that the software can be used on only one computer at a time.

Which of the following operating systems can you freely modify if you choose?

Linux is a Unix-like, open source and community-developed operating system for computers, servers, mainframes, mobile devices, and embedded devices. Open source means that anyone who wants to can modify the code, and many developers have decided to take that challenge.

Linux is defined as a __________________, which is also the core of an operating system.

Linux is a kernel, which is the core of an OS. Linux packages are put together as distributions and marketed as such.

Looping logic makes use of which of the following statements?

Looping logic is characterized by the while statement.

In object-oriented programming, which of the following are integral parts of objects? Each correct answer represents a complete solution. Choose two. A. Arrays B. Properties C. Attributes D. Variables

Objects are made up of properties, attributes, and methods. Arrays and variables could be part of an object but do not have to be.

Which of the following OSs uses the NT kernel?

Only Windows 10 uses the Windows NT kernel. Windows 3.11 was created before the NT kernel. macOS and Chrome OS do not use the NT kernel

Which of the following does not require users to pay for the software?

Open source software is generally free, and users can modify the application if they so choose.

Oscar's user account has been granted permissions to view a database. Nathan then uses the deny command in an attempt to deny Oscar the ability to view the database and applies it to a group to which Oscar belongs. Which of the following statements is true?

Oscar will not be able to view the database because if there is a permission conflict, a specific deny overrides a specific grant.

A user, Ann, is granted permissions to access a database. What is this an example of?

Permissions are considered part of data definition.

You want to visit a web page and make sure that the website does not steal any information about your identity. In that scenario, which of the following should you use?

Private browsing doesn't guarantee anonymity, but it doesn't use any of your cache or cookies, making it less likely that the site you visit can determine your identity.

You need to kill a process in Windows. Which utility should you use?

Processes are stopped (killed) in the Task Manager program.

What type of programming language is designed to retrieve data from a database? A. Query B. Assembly C. Interpreted D. Compiled

Query languages are used to obtain data from databases.

Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?

Semi-structured data. Pictures by themselves would be non-structured data, but since metadata is included, these pictures are classified as semi-structured data.

Your boss calls you on the phone while he is trying to install software. It is telling him that he needs a product key. Where should you tell him to look for it?

Software product keys are typically included on the package in which the installation CD-ROM was shipped. If the software was downloaded, then the manufacturer usually sends the software key via email.

Laura, your manager, instructs you to remove a table from a database permanently. Which command should you use?

Sometimes you need to delete tables or databases, and in database terms this is known as dropping. The DROP command is used for dropping a database or a table in a database.

Which of the following types of software licenses requires the user to pay yearly?

Subscriptions require the user to pay yearly. There are no recurring licenses.

A school has a database with four tables, but it needs a fifth table. Which command is used to accomplish this task?

The CREATE TABLE command is used to create new tables in a database.

George needs to remove a customer's information completely from a table. Which command should he use?

The DELETE command is used to remove records (rows) from a table.

Kate, a database administrator, needs to add records into a database. Which command should she use?

The INSERT command is used to insert records into an existing database.

Henry wants to understand which of his customers has purchased part number BB8. Which command should he use?

The SELECT command is used to create queries to search for data.

An employee at your office just got married and changed their last name. Which command do you use to change their last name in the employee database?

The UPDATE command is used to update existing data in the database.

A user calls to tell you that every time he browses the Internet, multiple browser windows keep appearing on his screen even though he has not opened them. In this scenario, what should you do to fix the problem?

The browser windows the user is getting are known as pop-up windows. Configure a pop-up blocker, which should resolve the problem. If not, it's possible the computer has malware.

You just copied a file from the Work directory to the Projects directory on your Windows PC. What happened to the file on the hard drive?

The file was copied to a new location on the hard drive and was associated with the Projects directory. When you copy a file, the original file remains intact, and a new version of that file is created elsewhere on the hard drive. The new version is associated with the new folder.

Interpret the following logic. For data input on someone who is 20 years old, which category will they fall into? if age < 13, then category "Child" else if age < 20, then category "Teen" else if age < 65, then category "Adult" else category "Senior"

The logic says that anyone younger than 20 is a teen, while anyone younger than 65 is an adult. Since this person is 20 exactly, they are in the Adult category.

You have just purchased licensed software and want to install it. Which of the following are you required to enter to install this software?

The product key will be required to install or use any licensed software product. The manufacturer will include this on the installation media or email it to you.

Which of the following statements defines the scalability feature of a database?

The scalability feature of a database allows databases to stretch between on-site servers and the cloud. The speed feature of a database processes and accesses large amount of data rapidly. The variety of data feature of a database stores data virtually and makes it available quickly. The security feature of a database provides much more intricate form of safety to the data.

Interpret the following logic. A law enforcement agency has received data indicating that there are ten current threats to public safety. What should the threat level be? if threats < 3, then level "Green" else if threats < 6, then level "Yellow" else if threats < 9, then level "Orange" else if threats < 12, then level "Red" else level "Emergency"

The threat level should be red. Anything from 9 to 11 is in the red range.

Which of the following are examples of interpreted languages? Each correct answer represents a complete solution. A. Compiled B. Query C. Scripted D. Markup

The three classes of interpreted languages are markup, scripted, and scripting languages.

When thinking of software compatibility, which two factors matter most?

The two most important things to consider are if the software was written to work with that operating system and if the computer has enough hardware to run the application.

You need to set up software for five users on a network. They all need to have access to and edit the same Excel files. Which is the best type of software for them to use?

The users need an online workspace, which will allow them to share files and work with them online. NOT project management or conferencing software, or document sharing software.

Peter is accessing a database using a JDBC connection. Which of the following terms best describes the type of access he is using?

Using a JDBC connection to a database is an example of direct/manual access.

You are visiting a website to order a product, but you keep seeing old information that you know is outdated. Which of the following will most likely fix the problem?

Web browsers cache information about websites. It's possible that the browser's cache is being read instead of the new data on the site. Clear the cache.

You are trying to enter registration information into a website. When you click the Submit button, nothing happens. You try again and still nothing. What is the most likely cause of this problem?

When you click a button on a web page, it activates a script telling the page and the server how to react. If scripts are blocked, then the button will not work properly.

You just deleted a shortcut to an important work presentation. What happened to the data in the presentation?

When you delete a shortcut, nothing happens to the file to which the shortcut pointed. The shortcut is just an easy way to access the file.

A medical office needs to create a solution to manage patient records. They have about 10,000 patients and eight staff, they want to include notes from medical professionals, emails to and from patients, and images such as X-ray. What should they create?

With different types of data, including images, the best choice for a database is a non-relational database such as a document database or a key/value database.

With which of the following file systems can you not rename a file when it's open?

With the FAT and NTFS file systems, you cannot rename a file, or change any of the metadata, while the file is open or in use.

Word processing, spreadsheets, and presentation software are examples of what?

Word processing, spreadsheets, and presentation software are three examples of productivity software. Other software types are email, PDF viewers, desktop publishing, personal information manager, and remote desktop software.

Michael, an administrator, needs to add a column to an existing table. Which command should he use?

You can use ALTER to add, delete, and modify columns.

You are going to purchase a new iPhone. Which operating system will be installed on it?

iOS

Peter, a friend of yours, has a piece of software that was written for macOS. Which of the following OSs will that software run on?

macOS only. A piece of software written for an OS will work only on that type of OS.


Conjuntos de estudio relacionados

Biology - Chapter 24 - Sustainability

View Set

World History II Unit IV - Ch 24

View Set

SMARTBOOK- Life and Classification

View Set

BOB HOGUE SALES ASSOCIATE EXAM REVIEW

View Set